Computer Software and Applications Conference, 1997. COMPSAC '97. Proceedings., The Twenty-First Annual International

13-15 Aug. 1997

Filter Results

Displaying Results 1 - 25 of 129
  • Proceedings Twenty-First Annual International Computer Software and Applications Conference (COMPSAC'97)

    Publication Year: 1997
    Request permission for commercial reuse | PDF file iconPDF (1478 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1997, Page(s):685 - 688
    Request permission for commercial reuse | PDF file iconPDF (195 KB)
    Freely Available from IEEE
  • Empirical evaluation of data allocation algorithms for distributed multimedia database systems

    Publication Year: 1997, Page(s):296 - 301
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    Given a distributed multimedia database system and a set of queries as well as their frequencies from each site, the objective of a data allocation algorithm is to locate the multimedia data objects (MDOs) at different sites so as to minimize the total data transfer cost incurred in executing the queries. The data allocation problem, however, is NP-complete, and thus requires fast heuristics to ge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal scheduling for normal and interactive operations in parallel video servers

    Publication Year: 1997, Page(s):290 - 295
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    This paper presents scheduling algorithms for normal and interactive playout in parallel video servers. These algorithms include conflict-free scheduling, delay minimization, and request relocation for normal playout, as well as prefetching and grouping for interactive operations. Performance is presented for these algorithms View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of data-centered approach to Year 2000 problem

    Publication Year: 1997, Page(s):287 - 288
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    The data-centered approach uses variable classifications, dependence analysis, generalised program slicing and ripple effect analysis. In the Year 2000 problem, this approach can be useful. Variable classification is used to identify all input and output variables, and once the initial set of variables that are Year 2000 related is identified, dependence analysis can be used to identify all the va... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation and performance assessment of multilevel data structures

    Publication Year: 1997, Page(s):153 - 157
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    The authors discuss the implementation and performance assessment of a multilevel data structure system prototype. They compare the multilevel data structure approach with corresponding fault-intolerant implementations to assess the overhead imposed for incorporating fault tolerance. The simulation shows promising results in using multilevel data structures View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of industrial-strength formal methods

    Publication Year: 1997, Page(s):332 - 337
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    Formal methods are used in a surprisingly wide variety of applications and ways throughout the world. While they may still be considered a niche market, there is growing evidence that they can be used successfully in industry if applied judiciously. The paper discusses same of the issues concerning the successful application of formal methods and surveys a number of examples of industrial usage, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Faster simulation of timed Petri nets via distributed simulation

    Publication Year: 1997, Page(s):149 - 152
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    In an earlier work (D. Kumar and S. Harous, 1990; 1994), we presented an approach towards the distributed simulation of timed Petri nets. This approach is based on some major changes to K.M. Chandy and J. Misra's (1979) null message based scheme. These changes were required because the well known distributed simulation schemes for discrete event systems do not directly apply to timed Petri nets du... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of a real-time multimedia presentation system using RTP

    Publication Year: 1997, Page(s):376 - 381
    Cited by:  Papers (3)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    A new class of protocols like RTP, RTSP and RSVP are tailoring today's packet networks for streaming real time multimedia data that once carried only non real time traffic. Multimedia networking is now possible with the existing network infrastructure. We describe a real time multimedia presentation system for media on demand over the Internet. It uses RTP and is capable of real time video/audio t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Derivation of safety requirements for safety analysis of object-oriented design documents

    Publication Year: 1997, Page(s):252 - 255
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    This paper discusses safety analysis of design documents constructed by object-oriented development approaches. In our previously proposed method, whether design documents satisfy safety requirements is checked using some information tables, and these safety requirements are assumed to be given in advance. However, any systematic method that can derive such safety requirements from requirements sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DRDB: a distributed real-time database server for high-assurance time-critical applications

    Publication Year: 1997, Page(s):362 - 367
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB)

    Many real time database systems are now being used in safety critical applications, in which human lives or expensive machinery may be at stake. Transactions in real time databases should be scheduled considering both data consistency and timing constraints. In addition, a real time database must adapt to changes in the operating environment and guarantee the completion of critical tasks. The effe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Task.o object modeling approach for robot workcell programming

    Publication Year: 1997, Page(s):109 - 114
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    Robot workcell programming is an application where object oriented programming paradigms can be effectively applied to handle the issues such as concurrency and autonomy. We present an object model named Task.o, and Task object Coupling (ToC) programming technique which uses Task.o objects. This approach is designed to increase the level of reusability, expandability, modifiability, and productivi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving I/O response times via prefetching and storage system reorganization

    Publication Year: 1997, Page(s):143 - 148
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    We present a storage management system that has the ability to adapt to the data access characteristics of the application that uses it, based on collection and analysis of runtime statistics. Adaptive reorganization is performed by the storage management system in a manner that optimizes the access patterns of the system for which it is used. Application-specific data clustering mechanisms can al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two test data selection strategies towards testing of Boolean specifications

    Publication Year: 1997, Page(s):608 - 611
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    Test data selection for software represented as Boolean formulae has not received much attention until the last decade. Most of the approaches are expression driven because generation of test cases is based on the Boolean formulae being tested. The paper discusses test data generation using a fault based approach in the sense that generation of test cases is based on particular types of faults occ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research directions in collaborative applications

    Publication Year: 1997, Page(s):44 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB)

    The author's position is fourfold: (i) collaborative applications are important, (ii) there are several complex design and implementation issues that must be resolved before such applications can become useful and commonplace, (iii) several existing disciplines partly address these issues and therefore researchers in these fields should get involved in this area, and (iv) much remains to be done b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Re-engineering solutions for Y2K challenge

    Publication Year: 1997, Page(s):285 - 286
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    The technologies to solve the Y2K problem are re-engineering technologies. Many tools are provided by tool venders to support various areas of Y2K activities. These activities are categorized into the following phases: the preparation phase, the analysis and design phase, the modification phase, and the testing and verification phase. Among these, the key phase is the analysis and design phase. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On QOS mapping in multimedia networks

    Publication Year: 1997, Page(s):312 - 317
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    A framework for studying ATM network QOS mapping between various levels in the information transport protocol stack and a platform for evaluating the mapping rules by performing concurrent network and application level measurements of QOS are presented. An empirical loss mapping rule between the application (frame) level and network (cell) level is given. The rule was tested using two 10 minute mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing extensibility of the design rule checker of an EDA tool by object-oriented modeling

    Publication Year: 1997, Page(s):104 - 108
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    Design rule checking systems are an integral part of electronic design automation tools. Rapid advances and continuous change in semiconductor technology requires that these DRC systems also change accordingly. The paper presents the architecture and mechanism of the DRC module of an IC package design tool. Design goals were identified for the module to allow easy addition, removal, and modificati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Army software metrics training

    Publication Year: 1997
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    The experience of the Army Metrics Training Program has been that most software development managers do not recognize or use the software metrics which are already available in their programs. The content of the Army Metrics course focuses on use of the “standard” Army set of metrics. However, the course material is presented in a workshop format, in which the student group discusses t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classifying architectural elements as a foundation for mechanism matching

    Publication Year: 1997, Page(s):14 - 17
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    Building a system at the architectural level can be thought of as decomposition into components followed by a series of exercises in matching. Components must be composed with each other via matching mechanisms; matching signatures within those mechanisms ensures that data and control flows through the system; and matching semantics among the components ensures that the system meets its behavioral... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance characterization of forwarding strategies in personal communication networks

    Publication Year: 1997, Page(s):137 - 142
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    The paper presents a framework for modeling and evaluating the performance of forwarding strategies in a personal communication services (PCS) mobile network. A forwarding strategy in the PCS network can be implemented by two mechanisms: a forwarding operation which follows a chain of databases to locate a mobile user, and a resetting operation which updates the databases in the chain so that the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software asset management and domain engineering

    Publication Year: 1997, Page(s):494 - 495
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB)

    Promoting reusability by managing software assets can greatly benefit companies that develop a family of similar products, where products are evolving from one another. One of the main goals of domain engineering is to identify and document the commonalities across the various products in a particular domain. Managing these common products or assets will keep the development cycle short for future... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test order for inter-class integration testing of object-oriented software

    Publication Year: 1997, Page(s):602 - 607
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    One major problem in inter class integration testing of object oriented software is to determine the order in which classes are tested. This test order, referred to as inter class test order, is important since it affects the order in which classes are developed, the use of test stubs and drivers for classes, and the preparation of test cases. The paper first proposes a number of desirable propert... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An overview of the Internet File System

    Publication Year: 1997, Page(s):474 - 477
    Cited by:  Patents (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    The Internet File System (IFS) extends the scope of file systems from LANs to the Internet, encouraging collaboration and information dissemination on a much broader scale. In addition, Internet resources (e.g. Web pages, Gopher Information, and Network News) become files in IFS, allowing file system APIs and existing tools and commands to be used to manipulate Internet resources just like convent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A content-based search engine on medical images for telemedicine

    Publication Year: 1997, Page(s):569 - 572
    Cited by:  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    Retrieving images by content and forming visual queries are important functionality of an image database system. Using textual descriptions to specify queries on image content is another important component of content-based search. The authors describe a medical image database system MIQS which supports visual queries such as query by example and query by sketch. In addition, it supports textual q... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.